Asee peer logo
Displaying results 1 - 30 of 33 in total
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Paper ID #15299Capstone Projects in a Computer Engineering Program Using ArduinoDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #14793Cross-Cohort Research Experience for Project Management and LeadershipDevelopmentDr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School of Electrical and Computer Engineering and (by courtesy) the Department of Computer Science of Purdue University. He is an ACM distinguished scientist and ACM distinguished speaker. He is a member in the organizing committee of the IEEE Rebooting Computing Initiative. He is the lead organizer of the first Low-Power Image Recognition Challenge in 2015, the chair (2014-2016) of the Multimedia Communication Systems Interest Group in
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Pat Smith, Oklahoma Christian University of Science and Arts
Tagged Divisions
Computing & Information Technology
Systems he worked with Cisco customers designing and deploying core Internet designs and technologies. In 2005 Mr. Smith earned a master’s degree in Computer Science from Colorado State and 1 year later left industry to teach engineering at Oklahoma Christian University. Mr. Smith’s emphasis is in first year student success, mentoring young engineers, and data communications. He consistently scores well in student feedback and enjoys regular strong relationships with his students and classes. c American Society for Engineering Education, 2016Developing an Android-based Layer 3 Switch as a senior projectAbstractA project-based course has been designed with a goal of developing an in-depth
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
42 49Associate 6 2 12 13Certificate 1 3 12Table 2: Graduation in Computer Science DepartmentLEAP Project Goal and ObjectivesThe goal of the LEAP project is to increase the graduation rate for students in Computer Scienceand Engineering programs at UVU, which is an open enrollment university, and to better preparethem for continued education and/or success in the STEM workforce. This is accomplished byproviding scholarships to academically talented students with financial need and by providingleadership training and opportunities, engaged learning activities, and mentorship (both student-to-student and faculty-to-student) 6.The objectives of the
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
John (Lalit) Jagtiani, University of Bridgeport; Neal A Lewis, University of Bridgeport
Tagged Divisions
Computing & Information Technology
attributed toindustry and business climate forces, SE educators want to be sure that the foundation whichthey provide to students is sound, realistic and aligned with desired learning outcomes.In this paper, we explore how experience-based software project data can serve as predictors andplay an important role in the management of SE projects. Predominantly, today’s SE curricula donot adequately focus on these aspects. The goal is to present the case for change and to suggestpractical and flexible methods of improvement. To achieve the goal, this paper examines why SEefforts experience high failure rates, how current curricula are structured, the intended learningoutcomes of SE courses, and where there is a gap in the achievement of those outcomes
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College; Tiera Kazar, Guilford College; Will C. Pizio, Guilford College
Tagged Divisions
Computing & Information Technology
Paper ID #14777Wireless Network Security Using Raspberry PiDr. Chafic BouSaba, Guilford College * Joined Guilford College in January 2008 * Serves as Assistant Professor in the Computing Technology and information Systems.Ms. Tiera Kazar, Guilford College I am a current student at Guilford College in the Computing Technology & Information Systems depart- ment. I am working on a Capstone project that will be submitted to the ASEE. The project focuses on Wireless Network Security using a Raspberry Pi.Dr. Will C. Pizio, Guilford College I am currently an Associate Professor of Justice and Policy Studies at Guilford
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Inst. of Tech.
Tagged Divisions
Computing & Information Technology
sophomore level. Our major renovation to this class is engaging students in asemester-long group project, which includes formal presentations, research, team work andmultiple active learning exercises. The semester-long group project consists of four phases:communication and planning, modeling, construction, and deployment. Through the four phases,students gradually gain communication, ethics, and teamwork professional skills. Comparisonamong data collected from the four phases show significant improvements of the students’professional skills, particularly presentation skills and teamwork skills.ABET student outcomes and performance indicators ABET student outcomes describe what students are expected to know and be able to do by thetime of
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
Paper ID #15364Mobile Computing & Security Laboratory DevelopmentDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Di Ma, University of Michigan - Dearborn Dr. Di Ma is
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Christina Frederick, Embry-Riddle Aeronautical University - Daytona Beach; Lulu Sun, Embry-Riddle Aeronautical University - Daytona Beach; Caroline Liron, Embry-Riddle Aeronautical University - Daytona Beach; Matthew A. Verleger, Embry-Riddle Aeronautical University - Daytona Beach; Rachel Marie Cunningham, Embry-Riddle Aeronautical University - Daytona Beach; Paula Sanjuan Espejo, Embry-Riddle Aeronautical University - Daytona Beach
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
-Eliciting Activities Learning System (MEALearning.com), a site designed for implementing, managing, and re- searching MEAs in large classes.Rachel Marie Cunningham, Embry-Riddle Aeronautical University - Daytona Beach Graduate Research Assistant at ERAU with an interest in design and creative thinking.Miss Paula Sanjuan Espejo, Embry-Riddle Aeronautical University - Daytona Beach I am an UG Aerospace Engineering student at Embry-Riddle Aeronautical University, Daytona Beach. I am from Spain and I am currently working on the SLA-aBLE project, the Implementation and Evaluation of Second Language Acquisition applied to programming courses. c American Society for Engineering Education, 2016
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
Paper ID #15885Integrating Software Testing to CS Curriculum Using WRESTT-CyLEDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Peter J. Clarke, Florida International University
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
Kee Wook Lee is a senior student at Purdue University, West Lafayette, IN, majored in electrical engi- neering.Dr. David B Nelson, Purdue University, West Lafayette David B. Nelson is Associate Director of the Center for Instructional Excellence at Purdue University. He received his Ph.D in World History from the University of California, Irvine in 2008. David has been involved in many educational research projects at Purdue, including published worked in the programming education, student engagement and academic performance in dynamics engineering courses, and educational modalities in engineering, technology and economics.Dr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Mathematics (STEM) educational researcher with the Georgia Institute of Technology. His educational experience in the Atlanta area for the past twenty years includes high school mathematics teaching, Math/Science Magnet Program Director, Title I educational data specialist, and Associate Professor of Information Technology. As a former US Air Force electronics engineer, Doug was also an engineering project manager.Jason Freeman, Georgia Institute of Technology Jason Freeman is an Associate Professor of Music at Georgia Tech. His artistic practice and scholarly research focus on using technology to engage diverse audiences in collaborative, experimental, and ac- cessible musical experiences. He also develops educational
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
(individual and group, in class and outside the class homework) as well as summative assessment?Data analysis and conclusions from the pilot project have been made public to benefit otherfaculty in CS and other SMT fields nationwide.KeywordsChallenge Based Instruction/learning (CBI), Interdisciplinary Studies, Engineering,Computational Science, Computer Graphics, Software Engineering. SMT (Science,Mathematics, and Technology) fields at minority-serving institutions.IntroductionThe advent of the 21st century with its technological advances has witnessed an explosion in theamount of information available to everyone through tools such as search engines, freeencyclopedias, on-line databases, and multimedia content, just to mention a few. The
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #15359Gamification-Based Cyber-Enabled Learning Environment of Software Test-ingDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Dr. Peter J. Clarke, Florida International
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sanjit K. Mitra, University of California - Santa Barbara; Woon-Seng Gan, Nanyang Technological University; Phyo Ko Ko, Nanyang Technological University; Hai Nguyen Duy, Nanyang Technological University
Tagged Divisions
Computing & Information Technology
sitting in the Board of Governor of APSIPA.Mr. Phyo Ko Ko, Nanyang Technological University PHYO KO KO received his BEng in Electrical and Electronic Engineering from Nanyang Technological University, Singapore in 2012. He is currently employed as a Project Officer in Digital Signal Processing Lab of School of Electrical and Electronic Engineering in Nanyang Technological University. His interests span in the areas of real-time audio signal processing, Java programming, C++ programming, android software development and audio modulation/demodulation.Mr. Hai Nguyen Duy, Nanyang Technological University Hai Nguyen Duy received his BEng in Electrical and Electronic Engineering from Nanyang Technological University
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
example, have sprites, costumes, andbackgrounds already created), which allows us to focus on any new CT skills or computerscience principles in a limited timeframe while reducing cognitive load. We continue to reduce the cognitive load, specifically extraneous load (2015)18, byputting scaffolding in place for each activity or project in the interventions. Scaffolding is asupport structure put in place for learners to accomplish tasks that they could otherwise notcomplete7. We take the approach of instructional scaffolding which correlates to programmingtutorials. However, as Repenning notes, direct instruction can actually limit studentmotivation, especially in females25. We utilize Problem-based Learning (PBL) (2009)28alongside Inquiry
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
generation IP protocol. Wemeasure IPv6 adoption through eight adoption metrics gleaned from eleven datasets. Datacollection covers a two year period from January 2014 through December 2015.In addition, we address the implications of the sudden uptick in IPv6 adoption, as it continues ona path of accelerated expansion. The long awaited transition from IPv4 to IPv6 has implicationsfor all organizations who will soon be making the change; many of which may not be preparedfor how to systematically approach such an undertaking. Factors such as project planning, IPv6saturation, infrastructure assessment, policy redesign, and network continuity are discussed askey areas that will need to be addressed as organizations begin to adopt IPv6.Key words: IPv6
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Danilo Garbi Zutin, Carinthia University of Applied Sciences; Michael E. Auer, Carinthia University of Applied Sciences
Tagged Divisions
Computing & Information Technology
Paper ID #15358Leveraging Online Lab Development: A New Paradigm to Offer EducationalLab Infrastructure as a Cloud ServiceDanilo Garbi Zutin, Carinthia University of Applied Sciences Danilo G. Zutin is currently a Senior Researcher and team member of the Center of Competence in Online Laboratories and Open Learning (CCOL) at the Carinthia University of Applied Sciences (CUAS), Vil- lach, Austria, where he has been engaged in projects for the development of online laboratories, softtware architectures for online laboratories and online engineering in general. Danilo is author or co-author of more than 30 scientific papers
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
then, many of them have already left the field. It is hypothesized that thislack of clarity of the field at an early point in students’ academic career, coupled with theperception that the curriculum is largely irrelevant to their lives, has impacted the retention ratesof computer science majors in the first two years of their academic study programs. This paperwill report on a preliminary stage of a comprehensive project effort that aims to improveretention rates for computer science students in their entry-level courses through thedevelopment of course modules intended for inclusion in their entry-level curriculum. Thetheoretical basis for these modules will be reviewed and the design framework for thedevelopment of these models is discussed
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #15901Android-Based Remote Robot Control SystemDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Mr. Md Hossain Shuvo, Alabama A&M University Graduate Student, Dept. of
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sarah A. Cunha; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
South Africa,specifically targeting hotels and restaurants. “PoS RAM Scraper Malware - Past, Present, andFuture” 5 includes in-depth specifics on Dexter’s operations. Three additional reportsdemonstrate the impact Dexter has had, as well as some specifics to its character. These reportsare “ASERT Threat Intelligence Brief 2014-3 Dexter and Project Hook Point of Sale MalwareActivity Update Point of Sale Malware Overview PoS Malware Activity : Dexter and ProjectHook” 8, “Visa Data Security Alert - Dexter Malware Targeting Point-of-Sale (POS) Systems” 9,and “Dexter and Project Hook Break the Bank - Inside Recent Point-of-Sale Malware CampaignActivities” 10.The research methodology will consist of a comparative study of the articles listed above
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alka R Harriger, Purdue University, West Lafayette; Mayari I. Serrano, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #16453Attracting Students to Programming via Physical ComputingProf. Alka R Harriger, Purdue University, West Lafayette Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she has been actively involved in teaching software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Realized through Information Technology) project. Since October 2013, she has been co-leading with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chengcheng Li, University of Cincinnati; Rucha Kulkarni, University of Cincinnati
Tagged Divisions
Computing & Information Technology
preparedcybersecurity workforce to defend IT infrastructure and fight against cybercrimes. It’s projectedthat the US is in an urgent demand of thousands of information security workers. The NationalScience Foundation has established a number of grants to award projects that promotecybersecurity education and curriculum development. Some of these projects have reportedsuccess of teaching hands-on skills through Gamification, a game-like learning environment.CTF (Capture-the-Flag) events are particularly successful in attracting college students, evenfrom non-IT/CS major and high school students into cybersecurity. This paper summarizes thecurrent popular Gamification technologies and the practice of using CTF and competitionprojects in classroom
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade
Tagged Divisions
Computing & Information Technology
American Society for Engineering Education (ASEE), serving as the past Program Chair for the Minorities in En- gineering Division. He has served as a chair, vice-chair, program chair, and program committee member for numerous conferences of ASEE.Dr. Mohd Abdelgadir Khairi, Najran University I, Mohamed Khairi, my bachelor degree in computer science. I did my Masters in system science from University of Ottawa, Canada. My PH.D was in ”Master Data Management” from University of Phoenix. I have over 20 years of experience in IT industry - ten of them with Microsoft in Redmond, WA. Currently I’m assistant professor at University of Najran. In addition of teaching and Research I’m coordinator of graduation projects and
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Tae-Hoon Kim, Purdue University - Calumet; Keyuan Jiang, Purdue University - Calumet; Vivek Singh Rajput
Tagged Divisions
Computing & Information Technology
and Savarese, Daniel and Dorband, John E and Ranawak, Udaya A and Packer, Charles V, "BEOWULF: A parallel workstation for scientific computation", in Proceedings, International Conference on Parallel Processing vol. 95, (1995).[12] Wikibooks. Building a Beowulf Cluster — Wikibooks, The Free Textbook Project. [online], 2011. http://en.wikibooks.org/w/index.php?title=Building_a_Beowulf_Cluster&oldid=2210594, last viewed December 2014.[13] Frinkle, Karl, and Mike Morris. "Developing a Hands-On Course Around Building and Testing High Performance Computing Clusters." Procedia Computer Science 51 (2015): 1907-1916.[14] Ngxande, Mkhuseli, and Nyalleng Moorosi. "Development of Beowulf Cluster to Perform Large
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Reza Hashemian P.E., Northern Illinois University; Suresh Vakati
Tagged Divisions
Computing & Information Technology
a client request. Figure 9: Hardware connection diagram for the remote programming system.The main idea of this project was to design an embedded processor system that could beprogrammable from remote locations. An Arduino Mega-2560 microcontroller board was usedas the embedded processor.10 All of the output devices were connected via the Arduino board.ASEE Annual Conference 2016 New Orleans, USFigure 9 shows a schematic diagram of the hardware system, while Figure 10 shows images ofthe completed system.Serial communication was established between the server and experiment set-up to achieveremote programming. When a user uploads a program to the server, it handles the incoming
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
over twenty years experience designing and supporting learning environments in academic settings. Her research has been funded by the National Science Foundation (an Ethics in Science and Engineering project to develop frameworks for developing ethical reasoning in engineers, and a Cyberlearning project to develop collaborative design environments for engineers), and by corporate foundations, the Department of Homeland Security, the College of En- gineering, and the Purdue Research Foundation. She has been recognized as the inaugural Butler Faculty Scholar, a Faculty Fellow in the CERIAS institute, a Service Learning Faculty Fellow, Diversity Faculty Fellow, and recipient of the Violet Haas Award (for efforts on
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
intellectually may prevent them from creating an effective solution.The goal of our project was to create narratives (case-studies) that students could understand,relate to, and be engaged with, so they can be used as the contexts to learn problem-solving andprocedural programming skills in the flowcharting component of the PS course. Since studentsknow what is relevant to them, we selected a group of five students majoring in ComputerSystems to help us develop those narratives.The use of student-developed narratives affected performance in different flowcharting structures(sequence, selection, repetition) differently. Overall, the data suggests that the use of case studieswas beneficial for increasing performance in flowcharting assessments using
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
activities can also automate gradingroutines and facilitates unique testing environments with variable content generation [3]. This isa powerful tool that enables the instructor to create unique assignments, and facilitates for quickand efficient grading of complex configurations.3. ConclusionsInstead of having to choose using either PT or GNS3 for network development, it might be aneven better idea to use them both together. As previously discussed, both programs target distinctaspects of an overall project, and can be used to complement each other. PT can be used to createa networking plan that incorporates the internal and external functions of a network. PT couldfurther facilitate ease of assessment and automated grading. GNS3, on the other hand
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
case studies.ProjectsAs part of the class students will complete a project and have the option to complete a secondproject to replace one lab. 1. Dropbox a. Students will create a discrete host that can be used as a work-around when a firewall has interrupted a security assessment. Students will learn about reverse SSH tunneling and other methods of circumnavigating a firewall, as well as what policies might fend off an attempt to place a dropbox within their own organization. 2. Build Your Own Lab a. This is a chance for students to develop their skills in an area of their choice by designing a lab which they think would be of value to their own studies and the